0% found this document useful (0 votes)
11 views

CS101 Lecture 1 - 2024-1

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

CS101 Lecture 1 - 2024-1

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 85

CS101

INTRODUCTION
TO COMPUTER
SCIENCE

Nemure T.(Mr)
Rerayi K.(Miss)
What is a
computer?
• This is an
electronic device
or machine, which
accepts inputs,
processes,
outputs and
stores data.
History of Computers
Classification of
Computers

• There are four types of Computers:


1. Super computer
2. Mainframe Computer
3. Servers
4. Mini Computer
5. Micro computer/ Personal
Computers
Super Computers
• It is the fastest and most powerful computer.
• It is designed to perform specific uses and can
process more than one quadrillion instructions
in a single second
• Areas where super computers can be used
include:
1. Weather forecasting
2. Space explorations
3. Artificial Intelligence
4. Scientific and mathematical research
Mainframe Computers
• It is a large, expensive and powerful computer
that can handle thousands of users connected
to it.
• They are used in large organizations where
many users need to access, to share data and
programs.
• They are also used as e-commerce servers
handling transactions over the internet.
Servers
• a server is a computer or a software program
that provides resources or services to other
computers, known as clients, over a network.
• These resources or services can include data,
files, web pages, applications, or various
functionalities.
• Servers respond to requests from clients,
such as web browsers, mobile apps, or other
devices, by sending the requested
information or performing specific tasks.
Mini Computers

• Moderate-sized
computers, smaller than
mainframes but more
capable than personal
computers, often used for
business and scientific
tasks.
Micro Computers
• It is a small, relatively inexpensive computer
with microprocessor as its CPU
• They are designed to be used by individuals
• They are classified into:
1. Workstation
2. Desktop
3. Laptop
4. Palmtop
5. PDA
Computer Hardware
• A computer is made up of Hardware and Software.
• Hardware refers to the physical components of a
computer.
• Software is the intangible computer components,
which are programs or instructions of the
computer.
• Software can also be referred to as a set of
instructions, which tells the computer what to do
and how to do it.
COMPONENTS OF A COMPUTER SYSTEM
Central Processing Unit (CPU)
• It is also called Processor.
• This the principal part of any digital computer
system generally composed of the Control
Unit, Arithmetic Logic Unit and Registers.
• The CPU is considered the brain of the
computer and it communicates with the input,
output and storage devices to perform tasks
that are important to the functioning of the
computer.
Control Unit (CU)
• It is the part of the CPU, which controls or
manages all the operations of the computer.
• The main function is to fetch and execute internal
instructions of the program from the main
memory to the processor instruction register.
• It determines what is to be done to follow the
instruction and transmits to the appropriate
device direction specifying the work to be done.
ARITHMETIC LOGIC UNIT (ALU)
• It is responsible for carrying out operations on
data. It is made up of the Arithmetic Unit and
the Logic Unit.
• Arithmetic Unit is responsible for carrying out
basic calculations such as addition,
subtraction, multiplication and divisions. Logic
Unit it performs the logical operations like
comparison (>, <, = etc.).
INPUT UNIT/INPUT DEVICES
• It is a device or hardware component that
allows data or instructions to be entered into
a computer system.
• The input unit is responsible for sending data
or instructions from an external source into
the computer's memory for processing.
Examples of Input Devices
• Keyboard • Remote Control
• Mouse • Sensors
• Joysticks • Camera
• Touchpad • Microphone
• Touch screen • Magnetic Stripe Reader
• Barcode Reader • Optical Mark Reader
Joystick & MSR
Output Unit/ Output Devices
• It is made up of hardware devices that receive
processed data and instructions from a
computer and then translate it into another
form that can be understood by humans or by
other external devices.
• That form may be audio, visual, textual or a
hardcopy such as printed document.
Examples of Output Devices

Monitor Projector

Headphone Printer

Speaker Plotter
Storage Devices
• This is a hardware used to hold data and
Instructions in a computer system either
temporarily or permanently
Types of Storage Devices

Primary Storage/ Main Secondary storage/


memory Permanent storage
Primary Storage/ Main memory

• It is the component of the computer that holds data


and program in current use.
• It is directly accessed by the processor.
• It serves as a working space for the CPU,
providing fast and direct access to data to
ensure efficient execution of programs.
• There are two types namely:
1. Random Access Memory (RAM)
2. Read Only Memory (ROM)
RAM
• It is the internal memory of the CPU for
storing data, programs and program results
that are in current use.
• It is a read/write memory and contents of the
memory can be changed.
• RAM is volatile meaning data stored in it is lost
when we switch off computer or if there is
power failure.
ROM
• Rom stores instructions that are required to
start a computer.
• It is a Read-Only memory and contents of this
memory cannot be changed
• It is a non-volatile memory meaning data
cannot be erased when the computer is
switched off.
Secondary storage/ Permanent storage

• Secondary storage is used for long-


term data storage.
• It stores data and programs that are
not actively in use, even when the
computer is powered off.
• It provides a means for data
persistence, allowing users to save
files, install software, and store large
volumes of data.
Examples of Secondary storage devices

• Magnetic Discs
• Hard Disk Drive/ Hard Drive (HD)
• Floppy Disk
• Compact Disk (CD)
• Digital Versatile Disk (DVD)
• Magnetic Tapes
• Memory Stick/ USB flash memory
Computer Software
• Computer software refers to a
collection of programs, data, and
instructions that tell a computer
what to do.
• It is a critical component of any
computer system, enabling it to
perform a wide range of tasks and
functions.
Types of Computer
Software
• Generally, we have two types of software
namely:
1. System Software
2. Application Software
System Software
• System software is a category of software that
manages and controls the computer hardware and
provides a foundation for running other software.
• - Key Functions: System software includes the
operating system (e.g., Windows, macOS, Linux)
that manages hardware resources, file systems,
and user interfaces.
• - Example: Microsoft Windows, macOS, and Linux
distributions are popular operating systems.
Operating Systems
• An operating system (OS) is a
fundamental software that manages
and controls a computer's hardware
and software resources.
• It serves as an intermediary between
the user and the computer's
hardware, making it easier to
interact with the machine.
Popular Operating
Systems
• a. Windows: - Developed by Microsoft, Windows is
one of the most widely used operating systems for
personal computers. - Examples include Windows 10
and Windows 11.
• b. macOS: - Developed by Apple, macOS is the
operating system used on Mac computers. - Examples
include macOS Catalina and macOS Big Sur.
• c. Linux: - Linux is an open-source operating system
used in various distributions (distros) such as Ubuntu,
Fedora, and Debian. - It is popular in servers and can
be used on desktops.
Mobile Operating Systems

• Mobile devices like smartphones and


tablets use operating systems
tailored for their specific needs.
• Examples include Android (Google),
iOS (Apple), and HarmonyOS
(Huawei).
Application Software
• Definition: Application software, also known
as "apps" or "programs," are designed for
specific tasks or user applications.
• - Key Functions: These programs are
created to perform tasks such as word
processing, spreadsheet calculations, graphic
design, gaming, and more.
• - Examples: Microsoft Word, Adobe
Photoshop, Google Chrome, and Minecraft
are examples of application software.
Computer Networks
• A computer network is a collection of
interconnected devices, such as
computers, servers, switches, routers,
and more, that can communicate and
share resources with each other.
• Networks play a crucial role in today's
digital world, enabling the exchange
of information and resources between
devices over varying distances.
Benefits of Computer Networks
• Resource Sharing: Networking allows devices to share
resources like printers, files, and internet connections.
This reduces redundancy and increases efficiency.
• Data Sharing: Users can easily share data and
information across the network, fostering collaboration
and data access from multiple locations.
• Centralized Data Management: Networks often
include central servers for data storage and
management, making backups, updates, and security
easier to manage.
• Communication: Networks facilitate instant
communication through email, instant messaging, and
video conferencing, enhancing productivity and
collaboration.
Benefits of Computer Networks
• Cost Savings: Sharing resources and centralizing
services can reduce hardware and maintenance
costs in the long run.
• Scalability: Networks can be easily expanded to
accommodate more devices and users as an
organization grows.
• Remote Access: Users can access network
resources from remote locations, increasing
flexibility and productivity.
• Security: While networks can be vulnerable to
security threats, they also allow for centralized
security measures like firewalls and access controls.
Types of Computer Networks
• LAN (Local Area Network): LANs are
typically confined to a limited geographic area,
such as a home, office building, or campus.
They use technologies like Ethernet cables or
Wi-Fi to connect devices within this local area.
• WAN (Wide Area Network): WANs cover
large geographic regions and connect multiple
LANs across long distances. The internet is the
most prominent example of a global WAN,
providing connectivity worldwide.
Types of Computer Networks
• MAN (Metropolitan Area Network): MANs
bridge the gap between LANs and WANs,
serving a city or a large campus. They offer
high-speed connections and are often used
by universities or citywide internet service
providers.
• PAN (Personal Area Network): PANs are
designed for personal use and typically cover
a short range. Common examples include
Bluetooth connections between smartphones
and headphones or laptops.
Network Categories
• Server-Based Network: In a server-based network,
one or more central servers manage resources and
services. Clients (individual devices) request access
to these resources from the server, which grants or
denies access based on permissions. This model is
prevalent in business environments, ensuring
centralized control and security.
• Peer-to-Peer Network: In a peer-to-peer network,
devices are considered equals, and each can act as
both a client and a server. Users can share resources
directly with one another, making it suitable for
small-scale setups and file sharing among friends or
colleagues.
Network Topology
• Network topology refers to the
physical or logical arrangement of
devices and connections in a
network.
• Different topologies offer various
advantages and are chosen based on
the specific requirements of the
network
Network Topology
• Network topology refers to the
physical or logical arrangement of
devices and connections in a
network.
• Different topologies offer various
advantages and are chosen based on
the specific requirements of the
network
Bus Topology
• Bus Topology: In a bus topology,
devices are connected in a linear
fashion along a single central cable.
• Data is broadcast to all devices, but
only the intended recipient processes
it.
• This simplicity makes it suitable for
small networks but less efficient for
larger ones.
Star Topology
• Star Topology: Star topology
features a central hub or switch to
which all devices are connected
individually.
• If one connection fails, it does not
impact the rest of the network,
ensuring reliability.
• This topology is commonly used in
home and business networks.
Ring Topology
• Ring Topology: Devices in a ring
topology form a closed-loop, where
data travels in one direction through
each device until it reaches the
intended recipient.
• While it's reliable, a failure in one
device or connection can disrupt the
entire network.
Mesh Topology
• Mesh Topology: In a mesh
topology, every device is connected
to every other device.
• This redundancy ensures fault
tolerance and multiple paths for data
to travel.
• It's often used in critical systems
where high availability is essential,
such as in data centers.
Hybrid Topology
• Hybrid Topology: Hybrid topologies
combine two or more of the above-
mentioned topologies to meet
specific network requirements.
• For example, a network might use a
star-bus hybrid to combine the
advantages of both.
Internet & Email
The Internet
• The Internet is the network of
networks being a worldwide
collection of computers that
communicate with one another over
cables, satellites and optical fibers.
• The Internet is the network used to
transport information.
Uses of The Internet
• Communication • Education and E-
• Information Learning
Access • Research and
Collaboration
• Online
• Business and
Shopping
Work
• Social • Information
Networking Sharing
• Entertainment • Government
Services
Intranet
• An intranet is a private network, which
belongs to an organization and is only
accessible by the organization's employee or
members.
• The main aim of the intranet is to share the
information and resources among the
organization employees.
• An intranet provides the facility to work in
groups and for teleconferences
Extranet
• It is a private network similar to an intranet
but can be accessed by third parties such as
vendors, suppliers, business partners etc.
The Internet
• When we refer to the Internet we are
usually talking about the World Wide
Web (WWW) which is the most used
feature of the Internet.
• The WWW stores millions of web
pages on web servers. These pages
can contain text, pictures, movies,
animation and sound.
• Web pages are written in a language
or code called HTML(Hypertext
The Internet
• A set of web pages is called a
website.
• Each web page has its own unique
address or URL. The URL will have
the format "http" and a domain (such
as .“ac.zw").
• What goes in between is arbitrary,
but often has the term "www "such
as in "http://www.name.co.uk". but it
doesn’t have to
(e.g.http://news.bbc.co.uk).
The Internet
• Web pages are connected by
hypertext links.
• When you move around web pages
you are said to be surfing the net.
• For this you need a program to read
the pages (called a browser), such
as Firefox or Internet Explorer.
• To search for a particular item or
topic on the net you use a search
engine.
The Internet
• The World Wide Web Is software
that runs on the internet which
includes all
documentation that is shared and
accessed on the internet.
• A Web page is a document designed
to be accessed and read over the
WWW. It must have an address in a
recognized format.
The Internet
• The Web uses three
standards/protocols namely:
• 1 URLs (Uniform Resource Locators) –
which are web page addresses
• 2 HTTP (Hypertext Transfer Protocol)
• 3 HTML (Hypertext Markup
Language)- – the language used to
design web pages
Dangers of The Internet
• Pornography: The internet contains explicit
adult content that can be easily accessed by
minors, leading to concerns about the exposure
of children to inappropriate material.
• Spam: Unsolicited emails, often promoting scams
or unwanted products, can inundate email
inboxes and waste users' time and resources.
• Phishing: Phishing attacks involve deceptive
emails or websites that mimic legitimate ones to
trick users into revealing personal information,
such as passwords and credit card details.
Dangers of The Internet
• Computer Viruses and Malware: Malicious
software can infect computers via the internet,
causing data loss, system damage, or
unauthorized access. Viruses, worms,
ransomware, and spyware are common threats.
• Identity Theft: Cybercriminals may steal
personal information from online profiles or
transactions, leading to identity theft and
financial fraud.
• Privacy Concerns: Users' personal data is often
collected and shared without their consent,
raising privacy issues. Data breaches can expose
sensitive information.
Dangers of The Internet
• Cyberbullying: The internet provides a platform
for bullying and harassment, with harmful
consequences for victims, especially in social
media and online communities.
• Misinformation and Fake News: The internet
can be a breeding ground for misinformation and
false information, which can spread rapidly and
have real-world consequences.
• Online Addiction: Excessive internet use,
including social media and gaming addiction, can
lead to mental health issues and disrupt daily life.
• Online Scams: Scammers use the internet to
run various fraudulent schemes, such as lottery
Email
• Emails, short for electronic mail, have
become a fundamental and ubiquitous
form of communication in the digital age.
• They allow individuals and organizations
to send and receive messages,
documents, and other digital content over
the internet quickly and efficiently.
• The exchange of emails relies on specific
protocols and standards to ensure reliable
and secure communication.
Email Basics
• Sender and Recipient: Emails have a sender (the
person or entity sending the message) and one or more
recipients (those who receive the message).
• Subject: Every email typically has a subject line that
provides a brief description of the message's content.
• Body: The body of the email contains the main message
or content, which can be plain text, formatted text,
images, attachments, or a combination of these.
• Attachments: Users can attach files (documents,
images, etc.) to emails to share additional information.
• Addresses: Email addresses consist of a username, "@"
symbol, and a domain name (e.g., "
[email protected]").
Email Protocols

• Emails rely on standardized protocols to


facilitate the sending, receiving, and retrieval of
messages. The most widely used email protocols
are:
• a. Simple Mail Transfer Protocol (SMTP):
SMTP is the protocol responsible for sending
emails from the sender's email client or server to
the recipient's email server. It defines the rules
for routing and delivering messages, ensuring
that emails reach their intended destinations.
SMTP servers handle outgoing messages.
Email Protocols

• b. Post Office Protocol (POP3): POP3 is an email


retrieval protocol that allows email clients to download
messages from a remote email server to the user's
local device. It's primarily used for accessing emails
from a single device, and messages are typically
removed from the server once downloaded.
• c. Internet Message Access Protocol (IMAP):
IMAP is another email retrieval protocol, but it is more
versatile than POP3. IMAP allows users to access their
email messages from multiple devices while keeping
messages synchronized across all devices. Messages
remain on the server, making it suitable for users who
want access from various locations.
Email benefits

• Fast delivery of your message


• Available 365 days, 24 hours per day - and, with
web mail, wherever you are in the world as long as
you have access to the internet.
• Cheap: when using broadband, individual mail
transfers are effectively free. When going online
from a dial-up account, calls are charged at local
rates and (for conventional email) need only last a
few seconds.
• Facility to send the same message to more than
one person
Email concerns

• It can only be sent to people who themselves


have access to the internet.
• Viruses are easily spread via email attachments -
anti virus measures must be in place to avoid this
and are now offered by many e-mail providers.
• Phishing - sending an e-mail to a user falsely
claiming to be a legitimate company to scam the
user into providing information such as personal
information and bank account numbers on a bogus
website. The details will then be used for identity
theft.
• No guarantee the mail will be read until the user
logs on and checks their mail.
Email Security
• Email security is a critical consideration due to the potential
for spam, phishing, malware, and other threats. To enhance
email security, various measures are employed, including:
• Email Encryption: Encryption technologies like Secure
Sockets Layer (SSL) and Transport Layer Security (TLS) are
used to protect the confidentiality of email content during
transmission.
• Spam Filters: Email providers and clients often employ
spam filters to automatically detect and move spam emails
to a separate folder.
• Anti-phishing Measures: These include verifying sender
identities, scanning for malicious links, and educating users
about phishing risks.
• Antivirus Software: Scanning email attachments and
links for malware is a standard practice to prevent
infections.
E-commerce
• E-commerce, short for electronic
commerce, has transformed the way
businesses and consumers engage in
buying and selling goods and
services.
• It involves the exchange of products,
services, or information over the
internet, and it has become a critical
component of the global economy.
Benefits of E-commerce:

• Convenience: E-commerce provides


unparalleled convenience for both
consumers and businesses. Shoppers can
browse and make purchases from the
comfort of their homes or on the go, 24/7.
This accessibility eliminates the
constraints of traditional brick-and-mortar
store hours.
• Wider Selection: E-commerce platforms
offer an extensive range of products and
services. Shoppers can access a global
marketplace, finding items that may not
Benefits of E-commerce:

• Price Comparison: Online shoppers can


easily compare prices, features, and
reviews of products from different vendors.
This transparency enables cost-conscious
buyers to find the best deals and value for
their money.
• Personalization: E-commerce websites
often employ algorithms and data
analytics to personalize the shopping
experience. Recommendations based on
previous purchases and browsing history
help customers discover products tailored
Benefits of E-commerce:

• Time Savings: E-commerce eliminates the need for


travel and waiting in long lines. Shoppers can
complete transactions quickly, freeing up time for
other activities.
• Global Reach: Businesses can reach a worldwide
audience through e-commerce, expanding their
customer base beyond geographic boundaries. This
global presence fosters growth and diversity.
• Lower Operating Costs: E-commerce businesses
can operate with lower overhead costs than
traditional brick-and-mortar stores. They save on
rent, utilities, and in many cases, employee salaries.
Benefits of E-commerce:

• Inventory Management: Digital storefronts can


efficiently manage inventory, reducing the risk of
overstocking or running out of products. Real-time updates
ensure customers are aware of product availability.
• Customer Insights: E-commerce platforms collect
valuable data on customer behavior and preferences.
Businesses can use this information for targeted marketing
and product development.
• Environmental Impact: E-commerce can contribute to
reducing carbon footprints by minimizing the need for
physical retail spaces, transportation, and packaging
waste.
Computer Security
Computer Security
• Computer security is the practice of
safeguarding computer systems,
networks, and data from
unauthorized access, damage, theft,
or disruption.
• It's a critical concern in today's
digital age due to the increasing
reliance on technology for both
personal and professional purposes.
Computer Security
• Computer security is the practice of
safeguarding computer systems,
networks, and data from
unauthorized access, damage, theft,
or disruption.
• It's a critical concern in today's
digital age due to the increasing
reliance on technology for both
personal and professional purposes.
• Malware (Virus, Trojan Horse,
Worm):
Virus
• A computer virus is a malicious software program
that attaches itself to legitimate programs or files.
• When executed, it replicates and spreads, often
causing harm by corrupting or destroying data, or
by compromising system functionality. To deal
with viruses:
• Install reputable antivirus software and keep it
updated.
• Regularly scan your computer for viruses.
• Be cautious about downloading files from
untrusted sources.
Trojan Horse
• A Trojan horse appears as a legitimate program
but contains hidden malicious code.
• It can give attackers unauthorized access to
your computer or steal sensitive information. To
deal with Trojans:
• Be cautious when downloading software or files
from the internet.
• Regularly update your operating system and
software to patch vulnerabilities.
• Use a firewall to monitor incoming and outgoing
traffic
Worm
• Worms are self-replicating malware that
can spread rapidly across networks. They
often exploit vulnerabilities in operating
systems or software. To deal with worms:
• Keep your operating system and software
up to date with security patches.
• Use intrusion detection systems to monitor
network activity.
• Employ strong network security practices
to prevent unauthorized access.
Hacking

• Hacking involves unauthorized


access to computer systems or
networks for various purposes, which
can range from stealing sensitive
data to disrupting services.
• Here's how to deal with hacking
threats:
1. Strong Passwords: Use complex and unique passwords for all
your accounts. Enable two-factor authentication (2FA) wherever
possible to add an extra layer of security.
2. Firewalls: Implement firewalls, both at the network and host
levels, to filter incoming and outgoing traffic and block potential
threats.
3. Regular Updates: Keep your operating system, software, and
applications up to date with the latest security patches.
Vulnerabilities in outdated software can be exploited by hackers.
4. Awareness: Educate yourself and your employees or family
members about common hacking techniques, such as phishing
scams and social engineering attacks.
5. Antivirus Software: Install reputable antivirus and anti-
malware software to detect and remove malicious software that
may be used by hackers.
1. Strong Passwords: Use complex and unique passwords for all
your accounts. Enable two-factor authentication (2FA) wherever
possible to add an extra layer of security.
2. Firewalls: Implement firewalls, both at the network and host
levels, to filter incoming and outgoing traffic and block potential
threats.
3. Regular Updates: Keep your operating system, software, and
applications up to date with the latest security patches.
Vulnerabilities in outdated software can be exploited by hackers.
4. Awarenaess: Educate yourself and your employees or family
members about common hacking techniques, such as phishing
scams and social engineering attacks.
5. Antivirus Software: Install reputable antivirus and anti-
malware software to detect and remove malicious software that
may be used by hackers.

You might also like